opensc.conf.in: clean up white spaces
git-svn-id: https://www.opensc-project.org/svnp/opensc/trunk@5105 c6295689-39f2-0310-b995-f0e70906c6a9
This commit is contained in:
parent
752af86f2b
commit
5405d74d19
|
@ -314,7 +314,7 @@ app default {
|
|||
# starcos cards were found to have a problem with this,
|
||||
# and only these two values were found to be filled with
|
||||
# the wrong value.
|
||||
#
|
||||
#
|
||||
# Fortunatly those values (if present) need to be positive.
|
||||
# Thus we can check if these are available and negative,
|
||||
# and if so fix them by adding 256 to get the correct value.
|
||||
|
@ -360,29 +360,29 @@ app opensc-pkcs11 {
|
|||
# Default: true
|
||||
# hide_empty_tokens = false;
|
||||
|
||||
# By default, the OpenSC PKCS#11 module will not lock your card
|
||||
# By default, the OpenSC PKCS#11 module will not lock your card
|
||||
# once you authenticate to the card via C_Login.
|
||||
#
|
||||
# Thus the other users or other applications is not prevented
|
||||
# from connecting to the card and perform crypto operations
|
||||
# (which may be possible because you have already authenticated
|
||||
# with the card). This setting is not very secure.
|
||||
# Thus the other users or other applications is not prevented
|
||||
# from connecting to the card and perform crypto operations
|
||||
# (which may be possible because you have already authenticated
|
||||
# with the card). This setting is not very secure.
|
||||
#
|
||||
# Also, if your card is not locked, you can enconter problems
|
||||
# due to limitation of the OpenSC framework, that still is not
|
||||
# thoroughly tested in the multi threads environment.
|
||||
#
|
||||
#
|
||||
# Your settings will be more secure if you choose to lock your
|
||||
# card. Nevertheless this behavior is a known violation of PKCS#11
|
||||
# specification. Now once one application has started using your
|
||||
# card with C_Login, no other application can use it, until
|
||||
# the first is done and calls C_Logout or C_Finalize. In the case
|
||||
# of many PKCS#11 application this does not happen until you exit
|
||||
# the application.
|
||||
# Thus it is impossible to use several smart card aware applications
|
||||
# the application.
|
||||
# Thus it is impossible to use several smart card aware applications
|
||||
# at the same time, e.g. you cannot run both Firefox and Thunderbird at
|
||||
# the same time, if both are configured to use your smart card.
|
||||
#
|
||||
#
|
||||
# Default: false
|
||||
# lock_login = true;
|
||||
|
||||
|
@ -414,7 +414,7 @@ app opensc-pkcs11 {
|
|||
# For the unknown reason the middleware of the manufacturer of gemalto (axalto, gemplus)
|
||||
# card reports as '0' the CKA_ID of CA cartificates.
|
||||
# Maybe someone else will need it. (Would be nice to know who and what for -- VTA)
|
||||
#
|
||||
#
|
||||
# Default: false
|
||||
# zero_ckaid_for_ca_certs = true;
|
||||
|
||||
|
|
Loading…
Reference in New Issue